MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 38966308974a1973a0ff01395612965813e52cd3c4929e11b32027a5dd461dd9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuakBot


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 38966308974a1973a0ff01395612965813e52cd3c4929e11b32027a5dd461dd9
SHA3-384 hash: 45233ae8196e3b2f4833048daefad52d3aceecbb98cb87bac95f876f60b5f509c14e8ed4ccbc8f30e2aaa959c0b7288f
SHA1 hash: 59104526688f2c7f22656c1df08359f04d4bf654
MD5 hash: ca293c0607fad1c23a40e8324c5bd686
humanhash: king-victor-spaghetti-foxtrot
File name:38966308974a1973a0ff01395612965813e52cd3c4929e11b32027a5dd461dd9
Download: download sample
Signature QuakBot
File size:271'872 bytes
First seen:2020-11-11 11:31:29 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 015974618e9105226f001019d35e62e5 (1'506 x Quakbot)
ssdeep 6144:DLfhdM/bXZswyIyO6t0nh7lqoDKOAP4PshaoA:nvKbXWNmVHelmEaoA
TLSH 9544F22324749436F81607FA4DA6D6B10D6E7828AE3145CF2FC95308472E9F28F767DA
Reporter seifreed
Tags:Quakbot

Intelligence


File Origin
# of uploads :
1
# of downloads :
59
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Launching a process
Creating a window
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.PinkSbot
Status:
Malicious
First seen:
2020-11-11 11:36:25 UTC
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot banker stealer trojan
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Qakbot/Qbot
Unpacked files
SH256 hash:
38966308974a1973a0ff01395612965813e52cd3c4929e11b32027a5dd461dd9
MD5 hash:
ca293c0607fad1c23a40e8324c5bd686
SHA1 hash:
59104526688f2c7f22656c1df08359f04d4bf654
SH256 hash:
f7477b480cf090068db5f4b3d89bb2c0ae1350658298b7b4dc23de26f415d184
MD5 hash:
f290b3c52bb65d2dd909a1934df41351
SHA1 hash:
8c05df0f5c5d42d360e02be09b0c94fe78906715
Detections:
win_qakbot_g0 win_qakbot_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments